Security Researcher II
@ Microsoft

Herzliya, Tel Aviv District, Israel
$140,000
On Site
Full Time
Posted 4 days ago

Your Application Journey

Personalized Resume
Apply
Email Hiring Manager
Interview

Email Hiring Manager

XXXXXXXX XXXXXXXXXXXXX XXXXXXXX***** @microsoft.com
Recommended after applying

Job Details

About the Security Researcher II Role

Microsoft's Cloud Apps and Identity Research (CAIR) team is seeking a Security Researcher II with expertise in identity based attacks and threats. This role focuses on analyzing authentication protocols and exploring identity based attack vectors to guide product and engineering teams.

Responsibilities

  • Analyze and understand authentication and network protocol internals.
  • Independently reproduce identity-based attacks for research purposes.
  • Examine identity logs and study current trends of identity attacks.
  • Collaborate with product and engineering teams on sensor design and detection ideas.
  • Support cybersecurity through expertise during security escalations and incidents.

Qualifications

The ideal candidate has at least 4+ years in security research, strong engineering skills in C/Python and proven expertise in Identity Security. A relevant B.Sc. or M.Sc. is required, and experience leading features from design through maintenance is highly valued.

Preferred Qualifications

Additional experience in offensive security research, recognized security research publications, and excellent interpersonal skills are a plus.

Key Skills/Competency

  • Identity Security
  • Authentication Protocols
  • Cloud Technologies
  • Network Security
  • Security Research
  • C/Python Development
  • Forensics
  • Incident Response
  • Threat Analysis
  • Collaboration

How to Get Hired at Microsoft

🎯 Tips for Getting Hired

  • Customize your resume: Tailor experiences to identity security research.
  • Showcase technical skills: Emphasize C/Python and protocol expertise.
  • Research Microsoft: Understand their culture and security priorities.
  • Prepare case studies: Highlight successful security research projects.

📝 Interview Preparation Advice

Technical Preparation

Review authentication protocols and identity logs.
Practice coding in C and Python.
Study forensic methodologies for identity attacks.
Analyze recent security research case studies.

Behavioral Questions

Describe a challenging project in research.
Discuss a time you collaborated on technical issues.
Explain your approach to incident response.
Share how you handle research setbacks.

Frequently Asked Questions